[1] SHAMIR A. Identity-based cryptosystem and signature scheme[C]//Proceeding of the Crypto '84-Advances in Cryptology. Berlin: Springer-Verlag, 1984:47-53. [2] ZHENG Y L. Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption)[C]//Proceeding of the Crypto '97-Advances in Cryptology. Berlin: Springer-Verlag, 1997:165-179. [3] AL-RIYAMI S, PATERSON K. Certificateless public key cryptography[C]//Proceeding of the International Association for Cryptology Research 2003. Berlin: Springer-Verlag, 2003:452-473. [4] BARBOSA M, FARSHIM P. Certificateless signcryption[C]//Proceeding of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008:369-372. [5] ZHU H, LI H, WANG Y. Certificateless signcryption scheme without pairing[J]. Journal of Computer Research and Development, 2010,47(9):1587-1594.(朱辉,李晖,王育民.不使用双线性对的无证书签密方案[J].计算机研究与发展,2010,47(9):1587-1594.) [6] LIU W, XU C. Certificateless signcryption scheme without bilinear pairing[J]. Journal of Software, 2011,22(8):1918-1926.(刘文浩,许春香.无双线性配对的无证书签密方案[J].软件学报,2011,22(8):1918-1926.) [7] JIAN Y. Cryptanalysis for two certificateless signcryption schemes[J]. Manufacturing Automation, 2013,35(1):83-85.(简岩.两种无证书签密方案的密码学分析[J].制造业自动化,2013,35(1):83-85.) [8] HE D. Security analysis of a certificateless signcryption scheme[J]. Journal of Software, 2013,35(1):83-85.(何德彪.无证书签密机制的安全性分析[J].软件学报,2013, 24(3):618-622.) [9] ZHOU C, WANG F. Improved certificateless signcryption scheme without pairing[J]. Computer Science, 2013,40(10):139-143.(周才学,王飞鹏.改进的无双线性对的无证书签密方案[J].计算机科学,2013,40(10):139-143.) [10] GAO J, WU X, QIN Y. Secure certificateless signcryption scheme without bilinear pairing[J]. Application Research of Computers, 2014,31(4):1195-1198.(高键鑫,吴晓平,秦艳琳.无双线性对的无证书安全签密方案[J].计算机应用研究,2014,31(4):1195-1198.) [11] YU Y, MU Y, WANG G, et al. Improved certificateless signature scheme provably secure in the standard model[J]. International Esports Tournament Information Security, 2012,6(2):102-110. [12] LUO Z, XIE J, GU W, et al. SM2-cryptosystem based information security supporting platform in power grid[J]. Automation of Electric Power Systems,2014,38(6):68-74.(骆钊,谢吉华,顾伟,等.基于SM2密码体系的电网信息安全支撑平台开发[J].电力系统自动化,2014,38(6):68-74.) [13] MENEZES A, OKAMOTO T, VANSTONE S A. Reducing elliptic curves logarithms to logarithms in a finite field[J]. International Organization for Standardization Technical Information Technology,1993,39(5):1639-1646. |